BUSINESS > Services > IT & Telecoms


« Back to News

2015-11-02

Cyber Attack Recovery Times Cause Big Concerns

When it comes to limiting damage and preventing data breaches, time is the biggest challenge for security and risk professionals.

2015-10-31

ISPs Asked To Block Pirate Sites

UK Internet service providers have been asked to block access to dozens of URLs that are suspected of linking to pirated content.

2015-11-02

New Material Promises NSA-proof Wallpaper

A flexible material, thin and tough for wallpaper or woven fabric that can keep electronic emissions in, and electromagnetic pulses out.

2015-11-01

Can Russian Submarines Cut Off the Internet?

The Russian navy might be disrupting undersea cables.

2015-10-30

The Arrival of Algorithmic Business

In today’s digital era, dynamic, digital algorithms are at the core of new customer interactions.

2015-10-28

Hackers Compromise Cisco Web

Malicious, data stealing JavaScript injected in the Cisco Web VPN login page of targeted organizations is hosted on legitimate sites.

2015-10-28

Apple Removes Spy Apps

Apple recently removed several apps from its store that pose a security risk by exposing a person's Web traffic to untrusted sources.

2015-10-27

Who Is responsible For Security in the Cloud?

Ponemon Survey: Only one third of respondents are confident the Cloud meets their security objectives.

2015-10-27

IBM Gives China Access to Software Code

IBM is giving the Chinese government access to some software code to demonstrate the security of its products.

2015-10-26

African States Quick To Adopt Network Surveillance

Governments in Sudan, Nigeria, South Africa and Ethiopia deploy sophisticated network eavesdropping tools against their citizens.

2015-10-23

Cybersecurity Firm Illusive Protects by Deception

Sometimes the best way to protect data is to make it appear as vulnerable as possible.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

Cyber Physical Security Research Center (CPSEC)

Cyber Physical Security Research Center (CPSEC)

CPSEC aims to contribute to the security enhancement of industrial infrastructure that creates value across cyber space and physical space.

Smart Contract Security Alliance

Smart Contract Security Alliance

The Smart Contract Security Alliance supports the blockchain ecosystem by building standards for smart contract security and smart contract audits.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

Tech Nation

Tech Nation

Tech Nation is the UK’s first national scaleup programme for the cyber security sector, aimed at ambitious tech companies ready for growth, at home and abroad.

CyVolve

CyVolve

Cyvolve is the next great leap forward in data security, ensuring constant encryption and pervasive control over all your data.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Vantea SMART

Vantea SMART

Vantea SMART have decades of experience in cybersecurity resulting in an approach of proactive prevention - Security by Design and by Default.

ClearVector

ClearVector

ClearVector is a leading provider of realtime, identity-driven security for the cloud.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

AnzenSage

AnzenSage

AnzenSage is a cybersecurity advisory consultancy specializing in security risk resilience for the food sector: agriculture, food manufacturing, food supply chain, vineyards, and wineries.

NMi Group

NMi Group

NMi Group is a global pioneer in mission-critical Testing, Inspection, Certification, and Calibration (TICC) services.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.

Screwloose IT

Screwloose IT

Screwloose IT are a national provider of information technology services. We specialise in managed IT, cloud services, cyber security, website design and digital marketing for businesses of all sizes.